Vulnerabilities > Use After Free

DATE CVE VULNERABILITY TITLE RISK
2022-07-28 CVE-2022-2157 Use After Free vulnerability in multiple products
Use after free in Interest groups in Google Chrome prior to 103.0.5060.53 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
8.8
2022-07-28 CVE-2022-2158 Use After Free vulnerability in multiple products
Type confusion in V8 in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
8.8
2022-07-28 CVE-2022-2161 Use After Free vulnerability in multiple products
Use after free in WebApp Provider in Google Chrome prior to 103.0.5060.53 allowed a remote attacker who convinced the user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.
network
low complexity
google fedoraproject CWE-416
8.8
2022-07-27 CVE-2022-1853 Use After Free vulnerability in Google Chrome
Use after free in Indexed DB in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
network
low complexity
google CWE-416
critical
9.6
2022-07-27 CVE-2022-1854 Use After Free vulnerability in Google Chrome
Use after free in ANGLE in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google CWE-416
8.8
2022-07-27 CVE-2022-1855 Use After Free vulnerability in Google Chrome
Use after free in Messaging in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google CWE-416
8.8
2022-07-27 CVE-2022-1856 Use After Free vulnerability in Google Chrome
Use after free in User Education in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension or specific user interaction.
network
low complexity
google CWE-416
8.8
2022-07-27 CVE-2022-1859 Use After Free vulnerability in Google Chrome
Use after free in Performance Manager in Google Chrome prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google CWE-416
8.8
2022-07-27 CVE-2022-1860 Use After Free vulnerability in Google Chrome
Use after free in UI Foundations in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific user interactions.
network
low complexity
google CWE-416
8.8
2022-07-27 CVE-2022-1861 Use After Free vulnerability in Google Chrome
Use after free in Sharing in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific user interaction.
network
low complexity
google CWE-416
8.8